N10-009 Exam Questions

Total 115 Questions

Last Updated Exam : 16-Dec-2024

Which of the following best explains the role of confidentiality with regard to data at rest?


A. Datacanbe accessedby anyone on the administrative network.


B. Datacanbe accessedremotely with proper training.


C. Datacanbe accessedafter privileged access Is granted.


D. Datacanbe accessedafter verifying the hash.





C.
  Datacanbe accessedafter privileged access Is granted.

Explanation: Confidentiality with Data at Rest: Confidentiality is a core principle of data security, ensuring that data stored (at rest) is only accessible to authorized individuals. This protection is achieved through mechanisms such as encryption, access controls, and permissions.

Privileged Access: The statement "Data can be accessed after privileged access is granted" aligns with the confidentiality principle, as it restricts data access to users who have been granted specific permissions or roles. Only those with the appropriate credentials or permissions can access the data.

Incorrect Options:

A. "Data can be accessed by anyone on the administrative network." This violates the principle of confidentiality by allowing unrestricted access.
B. "Data can be accessed remotely with proper training." This focuses on remote access rather than restricting access based on privileges.
D. "Data can be accessed after verifying the hash." This option relates more to data integrity rather than confidentiality.

[: CompTIA Network+ materials on data security principles, particularly sections on confidentiality and access control mechanisms​​., ]

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?


A. Reverse the fibers.


B. Reterminate the fibers.


C. Verify the fiber size.


D. Examine the cable runs for visual faults.





A.
  Reverse the fibers.

Explanation: When working with fiber optic cables, one common issue is that the transmit (TX) and receive (RX) fibers might be reversed. The first step in troubleshooting should be to reverse the fibers at one end to ensure they are correctly aligned (TX to RX and RX to TX). This is a simple and quick step to rule out a common issue before moving on to more complex troubleshooting.References: CompTIA Network+ study materials.

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?


A. With a voice VLAN


B. With too many VLANs


C. With a default VLAN


D. With a native VLAN





A.
  With a voice VLAN

Explanation: Explanation: It is common for an access port to have both a voice VLAN and a data VLAN. A voice VLAN separates voice traffic from regular data traffic, ensuring better quality and security for voice communications.

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?


A. Dig


B. Nmap


C. Tracert


D. nslookup





B.
  Nmap

Explanation: Nmap (Network Mapper) is a powerful network scanning tool used to discover hosts and services on a computer network. It can be used to identify which ports are open on a remote server, which can help diagnose access issues to services like a remote file server.
Port Scanning: Nmap can perform comprehensive port scans to determine which ports are open and what services are running on those ports.
Network Discovery: It provides detailed information about the host’s operating system, service versions, and network configuration.
Security Audits: Besides troubleshooting, Nmap is also used for security auditing and identifying potential vulnerabilities.
Network References:
CompTIA Network+ N10-007 Official Certification Guide: Covers network scanning tools and their uses.
Nmap Documentation: Official documentation provides extensive details on how to use Nmap for port scanning and network diagnostics.
Network+ Certification All-in-One Exam Guide: Discusses various network utilities, including Nmap, and their applications in network troubleshooting.

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?


A. Infrastructure as a service


B. Software as a service


C. Platform as a service


D. Network as a service





A.
  Infrastructure as a service

Explanation: [Reference: CompTIA Network+ Certification Exam Objectives - Cloud Models section., , ]

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?


A. ping 127.0.0.1


B. ping 169.254.1.1


C. ping 172.16.1.1


D. ping 192.168.1.1





A.
  ping 127.0.0.1

Explanation: The loopback address 127.0.0.1 is used to test the TCP/IP stack of the local machine. Pinging this address confirms whether the local system's networking stack is functioning correctly.

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?


A. Pre-shared key


B. Autonomous access point


C. Captive portal


D. WPA2 encryption





C.
  Captive portal

Explanation: A captive portal is a web page that users must view and interact with before being granted access to a network. It is commonly used in guest networks to enforce terms of use agreements. When a user connects to the network, they are redirected to this portal where they must accept the terms of use before proceeding. This method ensures that users are aware of and agree to the network's policies, making it the best choice for this scenario. References: CompTIA Network+ Exam Objectives and official study guides.

Which of the following would be violated if an employee accidentally deleted a customer's data?


A. Integrity


B. Confidentiality


C. Vulnerability


D. Availability





D.
  Availability

Explanation: Explanation: Availability refers to ensuring that data is accessible when needed. If a customer's data is accidentally deleted, it impacts availability, as the data can no longer be accessed.

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?


A. Jumbo frames


B. 802.1Q tagging


C. Native VLAN


D. Link aggregation





B.
  802.1Q tagging

Explanation: 802.1Q tagging, also known as VLAN tagging, is used to identify VLANs on a trunk link between switches. This allows the switches to transfer data for multiple VLANs (or networks) over a single physical connection. This method ensures that traffic from different VLANs is properly separated and managed across the network.References: CompTIA Network+ study materials.

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?


A. Clientless


B. Client-to-site


C. Full tunnel


D. Site-to-site





A.
  Clientless

Explanation: [Reference: CompTIA Network+ Certification Exam Objectives - Remote Access Methods section., ]


Page 3 out of 12 Pages
Previous